Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Mach SymposiumEvaluation of Real-Time Synchronization in Real-Time MachHideyuki Tokuda, Tatsuo Nakajima
    USENIX Mach SymposiumHow to Design Reliable Servers using Fault Tolerant Micro-Kernel MechanismsMichel Banâtre, Gilles Muller, Pack Heng, Bruno Rochat
    USENIX Mach SymposiumThe FIle System Belongs in the KernelBrent Welch
    USENIX Mach SymposiumDistributed Trusted Mach ArchitectureEdward John Sebes
    USENIX Security '23FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler
    USENIX Security '23Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference
    USENIX Security '23That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency
    USENIX Security '23Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
    USENIX Security '23Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations
    USENIX Security '23Investigating Verification Behavior and Perceptions of Visual Digital Certificates
    USENIX Security '23Remote Attacks on Speech Recognition Systems Using Sound from Power Supply
    USENIX Security '23HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
    USENIX Security '23TPatch: A Triggered Physical Adversarial Patch
    USENIX Security '23Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment
    USENIX Security '23GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation
    USENIX Security '23Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
    USENIX Security '23The Space of Adversarial Strategies
    USENIX Security '23Side-Channel Attacks on Optane Persistent Memory
    USENIX Security '23Automated Security Analysis of Exposure Notification Systems
    USENIX Security '23xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
    USENIX Security '23Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption
    USENIX Security '23Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild
    USENIX Security '23Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
    USENIX Security '23Humans vs. Machines in Malware Classification
    USENIX Security '23How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment

Pages